IUScholarWorksIndiana University Libraries
Communities & Collections
All of IUScholarWorks
  • English
  • العربية
  • বাংলা
  • Català
  • Čeština
  • Deutsch
  • Ελληνικά
  • Español
  • Suomi
  • Français
  • Gàidhlig
  • हिंदी
  • Magyar
  • Italiano
  • Қазақ
  • Latviešu
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Srpski (lat)
  • Српски
  • Svenska
  • Türkçe
  • Yкраї́нська
  • Tiếng Việt
Log In
External Users Only:
New external user? Click here to register. Have you forgotten your external user password?
  1. Home
  2. Browse by Author

Browsing by Author "Krenz, Mark"

Filter results by typing the first few letters
Now showing 1 - 14 of 14
  • Results Per Page
  • Sort Options
  • Loading...
    Thumbnail Image
    Item
    Access Control Policy
    (2021) Krenz, Mark; Adams, Andrew; Marsteller, James
  • Loading...
    Thumbnail Image
    Item
    Google Drive security considerations in an academic and research space
    (2021-08-23) Krenz, Mark; Abhinit, Ishan
    Cloud storage systems are used by millions worldwide for data storage. There are many cloud storage systems available. Popular options include Google Drive, Google Shared Drive, Microsoft OneDrive, and Box. In this paper we will provide a brief introduction to Google Drive and Google Shared Drive and review the issues of concern to security professionals which we have encountered during use. The academic and research communities often share and collaborate beyond organizational boundaries, making these security concerns especially relevant. There are many concerns that create significant security risks to the academic and research communities. This paper is a product of several years using Google Drive within a variety of contexts and projects, most notably ResearchSOC , Trusted CI , SGCI and SWAMP . These projects often involved collaborating on documents with personnel from multiple institutions, a common use case in the academic sector. The authors of this paper are or have been involved with these projects. During use, we observed several security risks and developed methods for mitigating these risks.
  • Loading...
    Thumbnail Image
    Item
    Jupyter Security Training NSF Summit 2019 Slides
    (2019-10-15) Wagner, Rick; Bussonnier, Matthias; Abhinit, Ishan; Krenz, Mark
    This is a PDF export of the slide deck used to provide security training on Jupyter at the 2019 NSF Cybersecurity Summit. It contains information about security Jupyter, JupyterHub and notebooks.
  • Loading...
    Thumbnail Image
    Item
    Master Information Security Policy & Procedures Trusted CI
    (2021-05-21) Krenz, Mark; Adams, Andrew
  • Loading...
    Thumbnail Image
    Item
    Recommendations For Improving the Security of a Science Gateway
    (2021-09-14) Abhinit, Ishan; Filus, Shane; Krenz, Mark
    This document, created by the Trusted CI team, provides an ease of implementation ordered list of security recommendations that can be used to help improve the security of a science gateway. It is focused on helping the science gateway that is implemented by a small team. The document was created as part of Trusted CI's collaboration with the Science Gateway Community Institute.
  • Loading...
    Thumbnail Image
    Item
    Science DMZ: Secure High Performance Data Transfer
    (2022-01-06) Abhinit, Ishan; Addleman, Hans; Benninger, Kathy; DuRousseau, Don; Krenz, Mark; Meade, Brenna
    Science DMZs are a unique network architecture for allowing high low latency high speed data transfers for science research data. This white paper introduces the idea and explains some of the security challenges and solutions. This document also explains some of the high level implementation details and makes security recommendations for decreasing the security risk while using a Science DMZ
  • Loading...
    Thumbnail Image
    Item
    Security Best Practices for Academic Cloud Service Providers
    (2018-05) Dooley, Rion; Edmonds, Andy; Hancock, David Y.; Lowe, John Michael; Skidmore, Edwin; Adams, Andrew K.; Kiser, Ryan; Krenz, Mark; Welch, Von; Knepper, Richard
  • Loading...
    Thumbnail Image
    Item
    Security Log Analysis Training
    (2017-08-15) Krenz, Mark
    CTSC’s mission is to provide the NSF community a coherent understanding of cybersecurity’s role in producing trustworthy science and the information and know-how required to achieve and maintain effective cybersecurity programs.
  • Loading...
    Thumbnail Image
    Item
    Security Log Analysis Training: 2017 Great Plains Network & Greater Western Library Alliance Annual Meeting
    (2017-06-02) Krenz, Mark
  • Loading...
    Thumbnail Image
    Item
    Security Log Analysis Training: 2019 Great Plains Network & Greater Western Library Alliance Annual Meeting
    (2019-05-22) Abhinit, Ishan; Krenz, Mark
    Slides used for security log analysis training session at the 2019 Great Plains Network All Hands Meeting in Kansas City. The slides contain information about how to prepare for doing log analysis, issues and also techniques for performing analysis to detect attacks.
  • Loading...
    Thumbnail Image
    Item
    The Report of the 2018 NSF Cybersecurity Summit for Large Facilities and Cyberinfrastructure
    (2018-12) Adams, Andrew; Dopheide, Jeannette; Krenz, Mark; Marsteller, James; Welch, Von; Zage, John
  • Loading...
    Thumbnail Image
    Item
    The State of the Scientific Software World: Findings of the 2021 Trusted CI Software Assurance Annual Challenge Interviews
    (2021-09) Peisert, Sean; Adams, Andrew; Avila, Kay; Heymann, Elisa; Krenz, Mark; Lee, Jason; Miller, Barton
  • Loading...
    Thumbnail Image
    Item
    Trusted CI Incident Response Policy and Procedures
    (2021-05-21) Krenz, Mark; ISO, Trusted CI
  • Loading...
    Thumbnail Image
    Item
    Trusted CI: Galaxy Engagement Final Report
    (2021-02-02) Krenz, Mark; Shankar, Anurag; Adams, Andrew; Filus, Shane; Shute, Kelli
  • Accessibility
  • Privacy Notice
  • Harmful Language Statement
  • Copyright © 2024 The Trustees of Indiana University